BOSTON -- Despite the rampant increase in "e-crimes" and high-tech scams, cyber experts here said that firms need not build the Fortress of Solitude to protect their computer systems and networks from hackers and viruses.
However, they should steer clear of being the lowest-hanging fruit on the tree, meaning firms should avoid making themselves ripe for the picking. Speakers at the National Investment Company Service Association's Technology Forum 2004 session "Vulnerability Management: Dealing With Worms and Hackers" said criminals often use the path of least resistance, choosing to attack firms that are the most vulnerable because of lax or misguided security initiatives.
Threats are ever-evolving and no system is foolproof. "You could spend a zillion million dollars and still not have an effective system in place," said Kevan Keegan, assistant vice president, MFS Service Center, Inc., and moderator of the panel.
There is a happy medium where firms can be smart about security, without going overboard, though, the panelists said. "We understand our threats [and] they are huge," said Diana Kelley, senior technology strategist for business software company Computer Associates. "But, technology for technology's sake doesn't make you any safer." The overall dollar amount allocated to systems security is less important than a company's attitude towards protection, as long as a reasonable amount of resources are provided to the initiatives. It boils down to the quality over quantity argument.
Kelley said one of the biggest gaffes a financial services firm, or any firm for that matter, can make is to take a silo-like view of security. "It's not just a firewall that sits on the perimeter of the company. It needs to be a part of the business," she said.
In fact, systems safekeeping and investment management can be viewed in much the same way, according to Kelley. "It isn't just security, per se, it's risk management. You need to know, analyze and understand the business management," she said.
Security breaches are becoming more common and almost a daily occurrence for major organizations. The panel illustrated the growing threat by citing recent news accounts. In early May, the Associated Press reported that 380,000 students, teachers and others associated with the University of California, San Diego, including applicants and alumni, had their confidential information compromised when hackers infiltrated the educator's computer systems. Also recently, Qualcomm's Eudora e-mail program had a dangerous system flaw, allowing the deployment of malicious code on vulnerable systems.
"It's always tough to talk about threats and not come off as an alarmist," said Brian Kelly, director of the Guiliani Advanced Security Center at Ernst & Young. "But the threat is evolving pretty rapidly."
James C. Burrell, supervisory special agent and supervisor of the Boston cyber-crime squad of the Federal Bureau of Investigation, said that firms are getting better at security, but are not necessarily motivated by protecting against criminal activity. Instead, they are primarily interested in safeguarding intellectual property for competitive reasons.
Burrell said his squad has done coordinated takedowns, and recently uncovered a case dubbed "Digital Pirates" that should be particularly alarming to financial services firms. In this case, an employee working for a financial services firm commandeered a company server and used the firm's bandwidth to distribute pirated copies of movies.
Aside from the misuse of company property and resources for illegal activity, which in itself could cause liability issues for the company, the breach also provided those pulling the movies from the firm's server a tunnel into the system, the panel members said. Once outsiders gained access to the firm's server to rip the movie files, the question then became, what else did the rogue employee open the firm up to? Were hackers able to exploit their free pass into the system to fish around for other sensitive information that could be used to rip off investors, or even the firm? Could outsiders send malicious files in though this security breach and cripple the system? Worms and viruses that can wreak havoc on IT departments and paralyze systems are on the rise.
An Inside Job
Alarmingly, the number of security violations being perpetrated by company insiders is about equal to that by outsiders, according to the 2003 CSI/FBI Computer Crime and Security Survey. Attacks by disgruntled employees are running even with those by hackers, illustrating the importance of employee screening. The survey consisted of 530 computer security practitioners in U.S. corporations, government agencies, financial institutions, medical institutions and universities.
One in four of those polled said that their Web site suffered unauthorized access or was the subject of misuse within the last year, according to the survey. While that number may seem uncomfortably high, what's worse is that 22% of respondents said they didn't know whether or not their site had been accessed by unauthorized individuals or had been misused. Also, in 2003, 15% of those surveyed said they did not know if their computer systems had suffered unauthorized use. Also, Internet attacks are on the rise as the population of users swells.
In addition to the logical concerns, such as safeguarding sensitive or proprietary information, firms also have to face other, previously non-existent or minimal threats. Protesters have staged virtual sit-ins, disrupting the Web sites of firms as well as plain old vandalism by defacing Web sites, a sort of graffiti with a 21st century twist. "Activists deserve our attention," Kelly said. Firms have become targets, as well as the resources of their business partners.
Then there is terrorists and terrorism to worry about. "There's been a tremendous amount of volunteerism for an electronic jihad," Kelly said. Terrorists' technological capabilities are more advanced than the public had previously understood, panelists said. And their financial infrastructure is vital to their success. Attacks on all fronts remain possible.
Copyright 2004 Thomson Media Inc. All Rights Reserved.